This Trojan downloads other files via the Internet and launches them for execution on the victim machine. It is an HTML page which contains Visual Basic Script and Java Script. It is 677 bytes in size.
Once the Trojan is launched, it uses a vulnerability in the ActiveX component which has the unique system registry identifier shown below:
The vulnerability (CVE-2007-4105) is present in the "DloadDS()" library "BaiduBar.dll". The Trojan attempts to load a file via this vulnerability. The file is located on the remote server shown below:
The file will be saved to the current user's Windows temporary directory and launched for execution.
At the time of writing, the link was not active.
If your computer does not have an up-to-date antivirus, or does not have an antivirus solution at all, follow the instructions below to delete the malicious program:
- Delete the original Trojan file (the location will depend on how the program originally penetrated the victim machine).
- Delete all files from %Temporary Internet Files%.
- Disable the vulnerable ActiveX object (see How to stop an ActiveX control from running in Internet Explorer
- Empty the temporary directory (%Temp%).
- Update your antivirus databases and perform a full scan of the computer (download a trial version of Kaspersky Anti-Virus).